First published: Tue Nov 10 2020(Updated: )
Prototype pollution vulnerability in '@strikeentco/set' version 1.0.0 allows attacker to cause a denial of service and may lead to remote code execution.
Credit: vulnerabilitylab@mend.io
Affected Software | Affected Version | How to fix |
---|---|---|
Set-value Project | =1.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-28267 is categorized as a medium severity vulnerability due to its potential to cause denial of service and remote code execution.
To mitigate CVE-2020-28267, upgrade to a fixed version of the '@strikeentco/set' package later than 1.0.0.
CVE-2020-28267 affects version 1.0.0 of the '@strikeentco/set' package.
CVE-2020-28267 is a prototype pollution vulnerability.
The potential impacts of CVE-2020-28267 include denial of service and the risk of remote code execution.